Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ee-Peng LimSingapore Management UniversityEmail verificata su smu.edu.sg
- Jaewon YangLinkedInEmail verificata su cs.stanford.edu
- Julian Kuiyu CHANG張圭煜MoSuMaEmail verificata su mosuma.com
- jianshu wengAI SingaporeEmail verificata su acm.org
- Jian PeiArthur S. Pearse Distinguished Professor, Duke UniversityEmail verificata su cs.sfu.ca
- Baoxu ShiUniversity of Notre Dame, LinkedInEmail verificata su linkedin.com
- C Lee GilesPennsylvania State UniversityEmail verificata su psu.edu
- Wang-Chien LeePennsylvania State UniversityEmail verificata su cse.psu.edu
- Zhen LiaoNankai UniversityEmail verificata su mail.nankai.edu.cn
- Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverEmail verificata su psu.edu
- Xingjie LiuData Mining Scientist of Square IncEmail verificata su cse.psu.edu
- Jing JiangSchool of Computing, ANU; School of Computing and Information Systems, SMUEmail verificata su smu.edu.sg
- Chenliang LiSchool of Cyber Science and Engineering, Wuhan UniversityEmail verificata su whu.edu.cn
- Aixin Sun 孙爱欣NTU SingaporeEmail verificata su ntu.edu.sg
- Hang LiBytedance ResearchEmail verificata su bytedance.com
- Daxin JiangGM S+D, Microsoft Search Technology Center AsiaEmail verificata su microsoft.com
- Daniel KiferPenn State UniversityEmail verificata su cse.psu.edu
- Yuanyuan TianMicrosoft Gray Systems Lab (GSL)Email verificata su umich.edu
- Jiawei HanAbel Bliss Professor of Computer Science, University of IllinoisEmail verificata su cs.uiuc.edu
- Enhong ChenUniversity of Science and Technology of ChinaEmail verificata su ustc.edu.cn